Home / Computer Fundamentals / Computer Fundamental Miscellaneous :: section-11

Computer Fundamentals :: Computer Fundamental Miscellaneous

  1. File specification books are created primarily for the use of

  2. A.

     systems analysts

    B.

     programmers

    C.

     operators

    D.

     managers

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Which of the following is used as storage locations both in the ALU and the control section of a computer?

  4. A.

     accumulator

    B.

     register

    C.

     adder

    D.

     decoder

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. The attribution of human form or qualities to things such as machines or computers is called

  6. A.

     cybernetics

    B.

     cybernation

    C.

     artificial intelligence

    D.

     anthropomorphism

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. The technique designed to support the effective access of micro-filmed data is:

  8. A.

     Microfiche retrieval

    B.

     COM

    C.

     Micrographics

    D.

     All the above

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. Which of the following persons probably has the least amount of technical knowledge?

  10. A.

     User

    B.

     Computer Operator

    C.

     System Analyst

    D.

     Programmer

    E.

     Computer professional

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. What is the name of the computer terminal which gives paper printout?

  12. A.

     Display screen

    B.

     Soft copy terminal

    C.

     Hard copy terminal

    D.

     Plotter

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. The primary advantage of key-to-tape data-entry systems is:

  14. A.

     A large percentage of editing can be performed at the time of data entry

    B.

     Key verification is easily performed

    C.

     The tape is reusable

    D.

     Keying errors can be detected as they occur

    E.

     All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. An advantage of overlapped processing activities is:

  16. A.

     more effective use of the CPU

    B.

     increased processing activities for the entire system

    C.

     better coordination of I/O activities

    D.

     all the above

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. Primary storage is _____as compared to secondary storage.

  18. A.

     Slow and inexpensive

    B.

     Fast and inexpensive

    C.

     Fast and expensive

    D.

     Slow and expensive

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. If the processor of a computer does not have a direct and unassisted access to data items, these items are said to be

  20. A.

     offline

    B.

     remote

    C.

     disconnected

    D.

     detached

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum